A Detailed Analysis on Secured Approach to Secret Key Extraction from Wireless Signal Strength Preserving Authentication and Security

Download Now
Provided by: Creative Commons
Topic: Security
Format: PDF
In this paper, the authors concerns the extension to the survey results detailed on 'A secured approach for secret key extraction from wireless signal strength preserving authentication & security'. This paper defines how authentication is implemented for secure verification scheme using the KEA algorithm and RC4 encryption is done which results in reducing the time complexity involved. Currently, the most common method for establishing a secret key is by using public key cryptography. However, public key cryptography consumes significant amount of computing resources and power which might not be available in certain scenarios.
Download Now

Find By Topic